SlideShare a Scribd company logo
1 of 34
Methodology 
 Passive Approach 
 Does not increase the traffic on the network 
 Measures traffic in real time 
 Lowest implementation costs 
 Non-proprietary 
 Independent from hardware vendor 
 No escape 
 Non-obtrusive.
Passive Monitoring Key Points 
 Highly secure compared to SNMP and RMON 
 Provides the highest detail of monitoring 
 In practice, all network problems can be discovered 
and solved using passive packet sniffer technology. 
 Stealth nature cannot be detected by other tools.
To whom is it useful? 
 useful to… 
 Network Administrators 
 Application Developers 
 Network Auditors 
 Students. 
 Everyday “Joe” who would like to know 
what is happening in his network
Unique Features… 
 Display in real time: 
 General traffic information 
 Total network traffic and bandwidth utilization 
 Graph for utilization and distribution 
 Detailed breakdown of packets, 
raw and decoded with optional filtering 
 Decode major protocols and sub-protocols 
 Highly secure compared to SNMP and RMON
Common Usage 
 Abnormal or Suspicious Activities Monitoring 
 Intrusion Monitoring 
 Bandwidth Monitoring 
 Critical Node Monitoring 
 Application Monitoring 
 Data Forensic (Packet Analysis) 
 Real time / offline Analysis. 
 Network Anomaly Detection. 
 Top Usage.
Bandwidth monitoring 
 Network Usage Statistic (General)
Critical node monitoring 
 Network Usage Statistic (Single)
Critical node monitoring 
 Network Trace (Single)
Critical node monitoring 
 Intelligent Address Book
Protocol Monitoring 
 Network Charts (Protocol Distribution -> 
Network Layer and IP-based)
Application Monitoring 
Network Charts (Protocol Distribution -> 
Application Layer Distribution)
Packet Analysis 
 Network Analyzer (Capture and Decode)
Packet Analysis 
Filtering
Reporting Toolkit Interface 
Daily, Weekly, Monthly Reporting 
Control Window
Sample Report
Network analysis fundamentals 
Ethernet 
 A network card is an Ethernet adapter 
 Each Ethernet adapter is globally assigned a 
unique hardware address. 
 It’s a 48-bit binary number generally written as 
12 hexadecimal digits 
Ex: (00:e0:30:3f:21:b6) 
 MAC addresses are used for data communication on a network 
 Unicast 
 Multicast 
 Broadcast The destination address of all 1s 
(ff:ff:ff:ff:ff:ff in hexadecimal) 
Ethernet II Frame
Network analysis fundamentals 
Hubs 
A hub is a device that runs at the physical layer of the OSI model and allows 
Ethernet networks to be easily expanded. 
When devices are connected to a hub, they hear everything that the other 
devices attached to the hub are sending, whether the data is destined for 
them or not.
Network analysis fundamentals 
Switches and Bridging 
 Bridges and switches are both intelligent 
devices that divide a network into collision 
domains to improve performance. 
 A collision domain is defined as a single 
CSMA/CD network in which there will be a 
collision if two stations attached to the system 
transmit at the same time.
Deployment 
 A Technician’s Tool Kit for Troubleshooting: 
 a laptop with j-Portable 
 Some straight-through and cross-over cables 
 a mini-hub 
 For Constant Monitoring 
 A dedicated monitoring machine installed with j-enterprise 
 Dedicated hub / mirrored switch for monitoring 
The point to plug in the monitoring machine 
depends on what we want to monitor.
 LAN Monitoring
 “Over the wire” monitoring
Monitoring network applications with j- 
Portable 
correct placement to capture specific communication
 Further steps to be taken will be based 
on these questions: 
 What do we want to monitor? 
 Where do we want to monitor? 
 What do we want to look for?
Things to monitor 
 To monitor network applications/software 
 To monitor performance of the network 
 To analyze network data & issues 
 To detect security breaches
Common Cases 
Scenario: You are developing a client server application. You need to 
troubleshoot it. Did the packets actually get transmitted by the client to the 
server? 
Scenario: You have installed a web based application server. 
Is the traffic to/from it as it should be? 
Use Capture Decode to see actual traffic, 
use Netrace to see actual connections
Common Cases… 
2. How we can monitor network performance ? 
Scenario:You have a network gateway and would like to 
monitor and know the percentage of utilization of your 
Internet access traffic. 
Use Network Statistics to view actual usage statistics, 
use Graph to view distributions by protocols. 
For history, use Reporting Tool. 
Bandwidth utilization, use Node Monitor
Common Cases… 
3. How to perform analysis of network data? 
Scenario: A worm is existent in your network 
Scenario: ARP poisoning is being actively done 
on the local network 
Capture and Decode to look for abnormal traffic. 
Pinpoint of the culprit can be done based on the 
Address Book data.
Common Cases… 
4. When can I use tools to analyze network issues? 
Scenario: A user complains “the network is slow” 
Use Statistical View to see if the network is congested, 
use Capture and Decode to view traffic and 
to pinpoint sources of problem.
Common Cases… 
5. How can I gain better network security? 
Scenario: An outsider is trying to scan machines on my 
network. 
Netrace will tell me the sources and destinations 
of those scans.
Common Cases… 
6. How can I optimize my network with j-Portable? 
Scenario: Your newly installed network printer is running 
AppleTalk and IPX but no one else is using it. 
Scenario: One of your routers is running unneeded 
IGMP or BGP protocols 
j-Portable: 
Use Capture & Decode and view network traffic, 
Filter for single address. Look for unneeded traffic. 
Make the needed adjustments on those devices.
Problem Detection ….. 
1. ARP storm detection 
 Monitor each host for certain time. 
 Each host should send a reasonable amount of 
ARP packet to resolve its IP address. 
 The host is sending an ARP storm, if it 
continuously send ARP requests to certain IPs 
or even to a range of IPs. ( broadcast normally)
Problem Detection ….. 
3. Worm detection 
 AV maintain a DB of all known worm signatures. 
 The moment av start the capturing process, it will sniff 
each packet and apply all filters on these packets. 
 The decoder will decode each of the captured and 
filtered traffic. 
 The dissector will extract the payload depend on the 
traffic type. 
 The payload then are matched to the DB of signatures. 
 If the match return 1, then worm detected.
Network monotoring

More Related Content

What's hot

Evaluating the vulnerability of network traffic using joint security and rout...
Evaluating the vulnerability of network traffic using joint security and rout...Evaluating the vulnerability of network traffic using joint security and rout...
Evaluating the vulnerability of network traffic using joint security and rout...
Mumbai Academisc
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
ashutosh rai
 
Artificial neural network for misuse detection
Artificial neural network for misuse detectionArtificial neural network for misuse detection
Artificial neural network for misuse detection
Likan Patra
 
Chapter 1 organizing data vantage domain action and validity
Chapter 1  organizing data  vantage domain action and validityChapter 1  organizing data  vantage domain action and validity
Chapter 1 organizing data vantage domain action and validity
Phu Nguyen
 

What's hot (20)

Evaluating the vulnerability of network traffic using joint security and rout...
Evaluating the vulnerability of network traffic using joint security and rout...Evaluating the vulnerability of network traffic using joint security and rout...
Evaluating the vulnerability of network traffic using joint security and rout...
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Network Analysis Using Wireshark Jan 18- seminar
Network Analysis Using Wireshark Jan 18- seminar Network Analysis Using Wireshark Jan 18- seminar
Network Analysis Using Wireshark Jan 18- seminar
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
The Spark
The SparkThe Spark
The Spark
 
Artificial neural network for misuse detection
Artificial neural network for misuse detectionArtificial neural network for misuse detection
Artificial neural network for misuse detection
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
4
44
4
 
5
55
5
 
Chapter 1 organizing data vantage domain action and validity
Chapter 1  organizing data  vantage domain action and validityChapter 1  organizing data  vantage domain action and validity
Chapter 1 organizing data vantage domain action and validity
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with Wireshark
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
M41028892
M41028892M41028892
M41028892
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 

Similar to Network monotoring

Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
Sourav Roy
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
ShainaBoling829
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
cclay3
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 

Similar to Network monotoring (20)

A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
 
Network forensics
Network forensicsNetwork forensics
Network forensics
 
Agata overview
Agata overviewAgata overview
Agata overview
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Identify and resolve network problems
Identify and resolve network problemsIdentify and resolve network problems
Identify and resolve network problems
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Creating an Effective Network Sniffer
Creating an Effective Network SnifferCreating an Effective Network Sniffer
Creating an Effective Network Sniffer
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
 

More from Programmer (7)

Tcp udp
Tcp udpTcp udp
Tcp udp
 
Protocols
ProtocolsProtocols
Protocols
 
Phishing
PhishingPhishing
Phishing
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Deployment guide1
Deployment guide1Deployment guide1
Deployment guide1
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Network monotoring

  • 1.
  • 2. Methodology  Passive Approach  Does not increase the traffic on the network  Measures traffic in real time  Lowest implementation costs  Non-proprietary  Independent from hardware vendor  No escape  Non-obtrusive.
  • 3. Passive Monitoring Key Points  Highly secure compared to SNMP and RMON  Provides the highest detail of monitoring  In practice, all network problems can be discovered and solved using passive packet sniffer technology.  Stealth nature cannot be detected by other tools.
  • 4. To whom is it useful?  useful to…  Network Administrators  Application Developers  Network Auditors  Students.  Everyday “Joe” who would like to know what is happening in his network
  • 5. Unique Features…  Display in real time:  General traffic information  Total network traffic and bandwidth utilization  Graph for utilization and distribution  Detailed breakdown of packets, raw and decoded with optional filtering  Decode major protocols and sub-protocols  Highly secure compared to SNMP and RMON
  • 6. Common Usage  Abnormal or Suspicious Activities Monitoring  Intrusion Monitoring  Bandwidth Monitoring  Critical Node Monitoring  Application Monitoring  Data Forensic (Packet Analysis)  Real time / offline Analysis.  Network Anomaly Detection.  Top Usage.
  • 7. Bandwidth monitoring  Network Usage Statistic (General)
  • 8. Critical node monitoring  Network Usage Statistic (Single)
  • 9. Critical node monitoring  Network Trace (Single)
  • 10. Critical node monitoring  Intelligent Address Book
  • 11. Protocol Monitoring  Network Charts (Protocol Distribution -> Network Layer and IP-based)
  • 12. Application Monitoring Network Charts (Protocol Distribution -> Application Layer Distribution)
  • 13. Packet Analysis  Network Analyzer (Capture and Decode)
  • 15. Reporting Toolkit Interface Daily, Weekly, Monthly Reporting Control Window
  • 17. Network analysis fundamentals Ethernet  A network card is an Ethernet adapter  Each Ethernet adapter is globally assigned a unique hardware address.  It’s a 48-bit binary number generally written as 12 hexadecimal digits Ex: (00:e0:30:3f:21:b6)  MAC addresses are used for data communication on a network  Unicast  Multicast  Broadcast The destination address of all 1s (ff:ff:ff:ff:ff:ff in hexadecimal) Ethernet II Frame
  • 18. Network analysis fundamentals Hubs A hub is a device that runs at the physical layer of the OSI model and allows Ethernet networks to be easily expanded. When devices are connected to a hub, they hear everything that the other devices attached to the hub are sending, whether the data is destined for them or not.
  • 19. Network analysis fundamentals Switches and Bridging  Bridges and switches are both intelligent devices that divide a network into collision domains to improve performance.  A collision domain is defined as a single CSMA/CD network in which there will be a collision if two stations attached to the system transmit at the same time.
  • 20. Deployment  A Technician’s Tool Kit for Troubleshooting:  a laptop with j-Portable  Some straight-through and cross-over cables  a mini-hub  For Constant Monitoring  A dedicated monitoring machine installed with j-enterprise  Dedicated hub / mirrored switch for monitoring The point to plug in the monitoring machine depends on what we want to monitor.
  • 22.  “Over the wire” monitoring
  • 23. Monitoring network applications with j- Portable correct placement to capture specific communication
  • 24.  Further steps to be taken will be based on these questions:  What do we want to monitor?  Where do we want to monitor?  What do we want to look for?
  • 25. Things to monitor  To monitor network applications/software  To monitor performance of the network  To analyze network data & issues  To detect security breaches
  • 26. Common Cases Scenario: You are developing a client server application. You need to troubleshoot it. Did the packets actually get transmitted by the client to the server? Scenario: You have installed a web based application server. Is the traffic to/from it as it should be? Use Capture Decode to see actual traffic, use Netrace to see actual connections
  • 27. Common Cases… 2. How we can monitor network performance ? Scenario:You have a network gateway and would like to monitor and know the percentage of utilization of your Internet access traffic. Use Network Statistics to view actual usage statistics, use Graph to view distributions by protocols. For history, use Reporting Tool. Bandwidth utilization, use Node Monitor
  • 28. Common Cases… 3. How to perform analysis of network data? Scenario: A worm is existent in your network Scenario: ARP poisoning is being actively done on the local network Capture and Decode to look for abnormal traffic. Pinpoint of the culprit can be done based on the Address Book data.
  • 29. Common Cases… 4. When can I use tools to analyze network issues? Scenario: A user complains “the network is slow” Use Statistical View to see if the network is congested, use Capture and Decode to view traffic and to pinpoint sources of problem.
  • 30. Common Cases… 5. How can I gain better network security? Scenario: An outsider is trying to scan machines on my network. Netrace will tell me the sources and destinations of those scans.
  • 31. Common Cases… 6. How can I optimize my network with j-Portable? Scenario: Your newly installed network printer is running AppleTalk and IPX but no one else is using it. Scenario: One of your routers is running unneeded IGMP or BGP protocols j-Portable: Use Capture & Decode and view network traffic, Filter for single address. Look for unneeded traffic. Make the needed adjustments on those devices.
  • 32. Problem Detection ….. 1. ARP storm detection  Monitor each host for certain time.  Each host should send a reasonable amount of ARP packet to resolve its IP address.  The host is sending an ARP storm, if it continuously send ARP requests to certain IPs or even to a range of IPs. ( broadcast normally)
  • 33. Problem Detection ….. 3. Worm detection  AV maintain a DB of all known worm signatures.  The moment av start the capturing process, it will sniff each packet and apply all filters on these packets.  The decoder will decode each of the captured and filtered traffic.  The dissector will extract the payload depend on the traffic type.  The payload then are matched to the DB of signatures.  If the match return 1, then worm detected.

Editor's Notes

  1. A typical network analyzer displays the decoded data in three panes: ■ Summary Displays a one-line summary of the highest-layer protocol contained in the frame, as well as the time of the capture and the source and destination addresses. ■ Detail Provides details on all the layers inside the frame. ■ Hex Displays the raw captured data in hexadecimal format. Network analyzers further provide the ability to create display filters so that a network professional can quickly find what he or she is looking for.
  2. Ethernet is the most widely deployed LAN technology in use today. Ethernet maps to the first and second layers of the OSI model. Each Ethernet adapter is globally assigned a unique hardware address. This address is known by many names: a MAC address, a burned-in address (BIA), a physical address, or simply the Ethernet address. This address is a 48-bit binary number generally written as 12 hexadecimal digits (six groups of two digits, the groups separated by dashes or colons). The address is set at the time of the NIC’s manufacture. Three types of MAC addresses are used for data communications on a network: ■ Unicast A unicast address represents a unique network adapter on a network. ■ Multicast A multicast address represents a group of network adapters on a network. A single frame sent to a multicast address is received by all the NICs in that particular multicast group and is ignored by the hosts that do not belong to that multicast group. ■ Broadcast The destination address of all 1s (ff:ff:ff:ff:ff:ff in hexadecimal) is reserved for broadcasts. Broadcast frames are received by all NICs on an Ethernet segment.
  3. Ethernet was originally designed as a bus topology. Cabling would go from one machine to the next and then to the next, and so on.This made Ethernet prone to cable failure, causing the entire network to fail if a single wiring connection was broken at any point. Ethernet’s star topology was invented using hubs. Cabling in this model goes from each station to a central hub.This configuration eliminates single points of failure on the cabling, but it makes the hub itself a central point of failure. However, hubs are less likely than cables to fail. Ethernet hubs can also act as repeaters, thereby extending the distance of your Ethernet network. What Is a Hub? A hub is a device that runs at the physical layer of the OSI model and allows Ethernet networks to be easily expanded. A hub allows for multiple Ethernet cable segments of any media type to be connected to create a larger network that operates as a single Ethernet LAN. Since hubs operate at the physical layer, they have no concept of source and destination addresses. A hub takes all bits received on one port and rebroadcasts them to all other ports. When devices are connected to a hub, they hear everything that the other devices attached to the hub are sending, whether the data is destined for them or not Hubs are also sometimes called multiport repeaters.A group of connected hubs is called a collision domain; all hosts on that shared Ethernet LAN use CSMA/CD to compete for transmission.
  4. To improve performance, LANs are usually broken down and separated by bridges or switches. Bridges and switches are both intelligent devices that divide a network into collision domains.
  5. Building a Tool Kit A network analyst should create a tool kit with all the parts necessary to troubleshoot problems. This tool kit should include: A laptop/pc with inetmon, Some straight-through and cross-over cables, a mini-hub. It is also a good idea to carry some standard networking tools such as an RJ-45 crimper, a punch-down tool, some screwdrivers, and a toner/probe.
  6. To monitor a collision domain, just plug in the monitoring monitor to the hub to be monitored. This will allow all traffic on the hub to be seen. Very often, a network analyst will show up at the wiring closet to monitor and capture traffic from a machine that is attached to a switch, only to find that there aren’t any available ports to plug the system into! Even worse, the switch might be unmanaged, with no way to mirror a port. This is where the mini hub comes in handy. You can “hub out” using your mini-hub and cables. Simply attach a mini-hub using a cross-over cable into the switch port where the machine you want to analyze was plugged in.
  7. To monitor traffic between point A and point B, simply do a “tap” or “hub out” The hub is placed between the cables connecting the 2 points. This will allow traffic between the two pints to be seen.
  8. What do we want to monitor? a whole LAN segment, specific connections, specific machines, specific protocols. When do we want to monitor? Indefinitely, until a problem is solved…, Where do we want to monitor? main access points on your network, your gateway, your Master WINS Server, various points all over your network
  9. Test application being developed to see if the correct traffic is created. Troubleshoot applications / testing Monitor your application server for the traffics involved
  10. Arp poisoning Worm Overuse of resources P2p Video conferencing/ streaming media from internet Slow network can m